From Reuters – Japan’s largest defense contractor reported its systems had been compromised, including computers at its shipyards and other facilities.
From Reuters – Japan’s largest defense contractor reported its systems had been compromised, including computers at its shipyards and other facilities.
Somini Sengupta at the NY Times Bits blog discusses the balance between online privacy and advertising effectiveness, and previews some of the issues that will be discussed during today’s hearing “Internet Privacy: The Impact and Burden of EU Regulation” in the House Subcommittee on Commerce, Manufacturing, and Trade.
Cecilia Kang at the Washington Post discusses the potential challenges facing the FCC’s net neutrality rules, including suits from commercial operators and action by lawmakers.
The Information Technology and Innovation Foundation is hosting a panel discussion on Richard Bennett’s report “Spectrum Policy for Innovation.” Panelists include Larry Downes (Tech Freedom), Rick Kaplan (Wireless Telecommunications Bureau), Blair Levin (Aspen Institute), David Redl (Counsel, House Committee on Energy and Commerce), and Rhod Shaw (Alpine Group).
Orin Kerr discusses the Computer Fraud and Abuse Act’s troubling language relating to the broad scope of information covered, and proposes a legislative fix to which both the DOJ and CFAA’s critics should be amenable.
Martyn Williams at PC World Australia reports on China’s pledge to increase its administration over the Internet, in an effort to:
“strengthen the development of civic morality” and “speed up the establishment of moral and behavioral norms that carry forward traditional Chinese virtues.”
Thomas Rid at the Kings of War blog has some critical analysis of Germany’s recently unveiled cyber security strategy.
James Cowie at the Renesys Blog discusses the technological differences between Libya’s Internet blackout and Egypt’s complete shutdown.
Michael Joseph Gross at Vanity Fair chronicles the history of Stuxnet – and reflects on its implications.